F5 BIG-IQ Centralized Management: Local Traffic & Network. Version 5.2

Similar documents
BIG-IQ Centralized Management: ADC. Version 5.0

F5 BIG-IQ Centralized Management: Local Traffic & Network Implementations. Version 5.4

BIG-IP Local Traffic Management: Basics. Version 12.1

F5 BIG-IQ Centralized Management: Device. Version 5.2

F5 BIG-IQ Centralized Management: Device. Version 5.3

Deploying the BIG-IP System for LDAP Traffic Management

DevCentral Basics: Application Delivery Services PRESENTED BY:

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7

Deploying F5 with Microsoft Remote Desktop Session Host Servers

F5 BIG-IQ Centralized Management: Upgrading a DCD Cluster to Version 5.4. Version 5.4

BIG-IP Device Service Clustering: Administration. Version 13.1

BIG-IP Device Service Clustering: Administration. Version 13.0

Deploying F5 with Microsoft Active Directory Federation Services

BIG-IP Local Traffic Manager : Implementations. Version

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v9.x with Microsoft IIS 7.0 and 7.5

BIG-IP TMOS : Implementations. Version 13.0

BIG-IP TMOS : Implementations. Version

Deploying F5 with Microsoft Active Directory Federation Services

Upgrading from TrafficShield 3.2.X to Application Security Module 9.2.3

Deploying F5 with Citrix XenApp or XenDesktop

F5 BIG-IQ Centralized Management: Upgrading Logging Nodes to Version 5.2 Without Preserving Existing Data. Version 5.2

BIG-IP Device Service Clustering: Administration. Version

The following topics describe how to manage various policies on the Firepower Management Center:

Deploying the BIG-IP System v10 with Oracle s BEA WebLogic

Deploying the BIG-IP System with SMTP servers

Deploying F5 with Citrix XenApp or XenDesktop

DEPLOYMENT GUIDE DEPLOYING THE BIG-IP SYSTEM WITH BEA WEBLOGIC SERVER

Deploying F5 with Microsoft Remote Desktop Gateway Servers

F5 BIG-IQ Centralized Management: Licensing and Initial Setup. Version 5.2

BIG-IP DataSafe Configuration. Version 13.1

Deploying F5 with Microsoft Remote Desktop Services

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP System v10 with Microsoft IIS 7.0 and 7.5

F5 BIG-IQ Centralized Management: Upgrading Version 5.x to Version 5.3. Version 5.3

BIG-IP Access Policy Manager : Implementations. Version 12.1

BIG-IP Acceleration: Network Configuration. Version

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

DEPLOYMENT GUIDE. Deploying F5 for High Availability and Scalability of Microsoft Dynamics 4.0

BIG-IP Service Provider: Message Routing Administration. Version 13.0

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Access Policy Manager with Oracle Access Manager

User Identity Sources

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide

HP Load Balancing Module

Configuring Virtual Servers

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP Access Policy Manager with IBM, Oracle, and Microsoft

Deploying the BIG-IP LTM and APM with Citrix XenApp or XenDesktop

BIG-IP DNS Services: Implementations. Version 12.0

Deploying the BIG-IP System with Oracle WebLogic Server

DEPLOYMENT GUIDE Version 1.3. Deploying F5 with VMware ESX Server

Installing and Configuring vcloud Connector

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Access Policy Manager v with Oracle Access Manager

DEPLOYMENT GUIDE Version 1.0. Deploying F5 with Oracle Fusion Middleware WebCenter 11gR1

F5 Networks F5LTM12: F5 Networks Configuring BIG-IP LTM: Local Traffic Manager. Upcoming Dates. Course Description. Course Outline

BIG-IP Access Policy Manager : Portal Access. Version 13.0

vcmp for Appliance Models: Administration Version

Deploying the BIG-IP System v11 with Microsoft Exchange 2010 and 2013 Client Access Servers

Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M

vcmp for Appliance Models: Administration Version 13.0

BIG-IP Link Controller : Implementations. Version 12.1

BIG-IP Application Security Manager : Implementations. Version 11.3

User Identity Sources

BIG-IP Analytics: Implementations. Version 13.1

KYOCERA Net Admin User Guide

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide

Deploying the BIG-IP System with Microsoft IIS

BIG-IP Global Traffic Manager : Load Balancing. Version 11.6

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

vrealize Orchestrator Load Balancing

BIG-IP Access Policy Manager : Portal Access. Version 12.1

BIG-IP DNS: Load Balancing. Version 13.1

Managing CX Devices in Multiple Device Mode

vcloud Director Tenant Portal Guide vcloud Director 8.20

Deploying Microsoft SharePoint with the F5 WebAccelerator

Load Balancing Technology White Paper

BIG-IP DNS: Implementations. Version 12.0

Host Identity Sources

Barracuda Link Balancer

Getting Started with VMware View View 3.1

Management and Orchestration with F5 BIG-IQ 4.5. Philippe Bogaerts F5 Networks

BIG-IP Analytics: Implementations. Version 12.1

Configuring CWMP Service

Dell EMC Unity Family

BIG-IP DNS Services: Implementations. Version 12.1

Privileged Remote Access Failover Configuration

F5 BIG-IQ Centralized Management: Licensing and Initial Setup. Version 5.4

Configuring Management Access

BIG-IP Local Traffic Manager : Monitors Reference 13.0

ForeScout Extended Module for Tenable Vulnerability Management

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP LTM for SIP Traffic Management. Archived

Network Discovery Policies

Failover Configuration Bomgar Privileged Access

Load Balancing VMware Identity Manager

Data collected by Trend Micro is subject to the conditions stated in the Trend Micro Privacy Policy:

BIG-IP System: Migrating Devices and Configurations Between Different Platforms. Version

vrealize Orchestrator Load Balancing

vserver vserver virtserver-name no vserver virtserver-name Syntax Description

F5 Herculon SSL Orchestrator : Setup. Version

USER GUIDE Summer 2015

Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services

BIG-IP Local Traffic Manager : Implementations. Version 12.1

Transcription:

F5 BIG-IQ Centralized Management: Local Traffic & Network Version 5.2

Table of Contents Table of Contents BIG-IQ Local Traffic & Network: Overview... 5 What is Local Traffic & Network?... 5 Understanding BIG-IQ Local Traffic & Network...5 About BIG-IQ Centralized Management configuration sets... 6 Managing Device Resources... 7 How do I start managing BIG-IP devices from BIG-IQ?...7 Adding devices to the BIG-IQ inventory... 7 Importing service configurations for a device...8 Managing a device from the device properties screen...9 Filtering the BIG-IP device inventory list for specific BIG-IP components... 9 How do I change object settings on a managed device?...10 Changing device local traffic objects... 10 Changing network objects...28 Users, User Groups, Roles, and Authentication... 33 How do I manage user access to BIG-IQ?...33 Use my LDAP server to authenticate BIG-IQ users... 33 Add a user and assign them a role...36 How do I limit privileges for users based on their role in the company?... 37 Standard roles shipped with BIG-IQ...38 Adding a role... 39 Change your BIG-IQ user password... 39 Provide a user access to BIG-IQ and assign them a role... 40 Remove a BIG-IQ user from a role...40 Legal Notices... 43 Legal notices...43 3

Table of Contents 4

BIG-IQ Local Traffic & Network: Overview What is Local Traffic & Network? Local Traffic & Network are two parts of centralized management that you use to manage the local traffic (such as servers, nodes, pools, or pool members) and network (such as interfaces, self IP addresses, or VLANs) configuration objects that move your traffic. Local Traffic & Network helps the user: Create efficient work flows to view the Local Traffic & Network configurations in a relational and dynamic user interface. Control access to configuration objects using fine-grained, role-based access control (RBAC). This allows administrators to delegate frequently performed operations (for example, enabling or disabling pool members) to the correct team member. Maintain ultimate control of the LTM configuration by providing a staging option. Delegated team members make all relevant changes, then the administrator can apply them after a quick review. Understanding BIG-IQ Local Traffic & Network Local Traffic & Network features include: Device discovery with import of local traffic and network objects referenced by discovered devices Management of shared objects (such as profiles, monitors, and irules ) Audit log used to record every local traffic or network change and event Role-based access control Deployment of configurations from snapshots, and the ability to preview differences between snapshots Local traffic & network provides a centralized management platform so you can perform all these tasks from a single location. Rather than log in to each device to manage the object configuration locally, it is more expedient to use one interface to manage many devices. Not only does this simplify logistics, but you can maintain a common set of configuration objects and deploy a common set of profiles, monitors, and other shared objects to multiple, similar devices from a central interface. Bringing a device under central management means that its configuration is stored in the local traffic & network database, which is the authoritative source for all configuration entities. This database is also known as the working configuration or working-configuration set. Once you discover and import services for a device, it is deemed to be under central management. You should not make changes locally (on the BIG-IP device) to a device that is under central management unless there is an exceptional need. Important: If changes are made locally for any reason, rediscover and reimport the device to reconcile those changes with the local traffic & network working configuration set. Unless local changes are reconciled, the deployment process overwrites any local changes. In addition, BIG-IQ is aware of functionality that exists in one BIG-IP system version but not in another. This means, for example, that it prohibits using shared objects on BIG-IP devices that do not have the software version required to support them.

BIG-IQ Local Traffic & Network: Overview About BIG-IQ Centralized Management configuration sets The BIG-IQ Centralized Management system uses the following terminology to refer to configuration sets for a centrally-managed BIG-IP device: Current configuration set The configuration of the BIG-IP device as discovered by BIG-IQ Centralized Management. The current configuration is updated during a re-discover and re-import, and before calculating differences during the deployment process. Working configuration set The configuration as maintained by BIG-IQ Centralized Management. The working configuration is the configuration that is edited on BIG-IQ Centralized Management and deployed back to BIG-IP devices. The working configuration is created when the administrator first manages the BIG-IP device from the BIG-IQ Centralized Management system. The working configuration is updated when a device is re-imported or re-discovered. If conflicts are observed during a re-discover and re-import, the object in conflict is only updated in the working configuration when the Use BIG-IP resolution conflict option is used. 6

Managing Device Resources How do I start managing BIG-IP devices from BIG-IQ? To start managing a BIG-IP device, you must add it to the BIG-IP Devices inventory list on the BIG- IQ system. Adding a device to the BIG-IP Devices inventory is a two-stage process. Stage 1: You enter the IP address and credentials of the BIG-IP device you're adding, and associate it with a cluster (if applicable). BIG-IQ opens communication (establishes trust) with the BIG-IP device. BIG-IQ discovers the current configuration for any selected services you specified are licensed on the BIG-IP system, like LTM (optional). Stage 2: BIG-IQ imports the licensed services configuration you selected in stage 1 (optional). Note: If you only want to do basic management tasks (like software upgrades, license management, and UCS backups) for a BIG-IP device, you do not have to discover and import service configurations. Adding devices to the BIG-IQ inventory Before you can add BIG-IP devices to the BIG-IQ inventory: The BIG-IP device must be located in your network and running a compatible software version. Refer to https://support.f5.com/kb/en-us/solutions/public/14000/500/sol14592.html for more information. Port 22 and 443 must be open to the BIG-IQ management address, or any alternative IP address used to add the BIG-IP device to the BIG-IQ inventory. These ports and the management IP address are open by default on BIG-IQ. If you are running BIG-IP version 11.5.1 up to version 11.6.0, you might need root user credentials to discover and add the device to the BIG-IP devices inventory. You don't need root user credentials for BIG-IP devices running 11.5.0-11.5.1 and 11.6.1-12.x. Note: A BIG-IP device running versions 10.2.0-11.5.0 is considered a legacy device and cannot be discovered from BIG-IQ version 5.2. If you were managing a legacy device in previous version of BIG-IQ and upgraded to version 5.2, the legacy device displays as impaired with a yellow triangle next to it in the BIG-IP Devices inventory. To manage it, you must upgrade it to 11.5.0 or later. For instructions, refer to the section titled, Upgrading a Legacy Device. You add BIG-IP devices to the BIG-IQ system inventory as the first step to managing them. Note: The ADC component is automatically included (first) any time you discover or import services for a device. 1. At the top of the screen, click Devices. 2. Click the Add Device button. 3. In the IP Address field, type the IPv4 or IPv6 address of the device.

Managing Device Resources 4. In the User Name and Password fields, type the user name and password for the device. 5. If this device is part of a DSC pair, from the Cluster Display Name list, select one of the following: For an existing DSC pair, select Use Existing from the list and select the name DSC group from the list. To create a new DSC pair, select Create New from the list, and type a name in the field. For BIG-IQ to properly associate the two devices in the same DSC group, the Cluster Display Name must be the same for both members in a group. There can be only two members in a DSC group. 6. If this device is configured in a DSC pair, select an option: Initiate BIG-IP DSC sync when deploying configuration changes (Recommended) Select this option if this device is part of a DSC pair and you want this device to automatically synchronize configuration changes with the other member in the DSC group. Ignore BIG-IP DSC sync when deploying configuration changes Select this option if you want to manually synchronize configurations changes between the two members in the DSC group. 7. Click the Add button at the bottom of the screen. The BIG-IQ system opens communication to the BIG-IP device, and checks its framework. Note: The BIG-IQ system can properly manage a BIG-IP device only if the BIG-IP device is running a compatible version of the REST framework. 8. If a framework upgrade is required, in the popup window, in the Root User Name and Root Password fields, type the root user name and password for the BIG-IP device, and click Continue. 9. If in addition to basic management tasks (like software upgrades, license management, and UCS backups) you also want to centrally manage this device's configurations for licensed services, select the check box next to each service you want to discover and then click Continue. You can also select these service configuration after you add the BIG-IP device to the inventory. 10. Click the Add button at the bottom of the screen. BIG-IQ displays a discovering message in the Services column of the inventory list. If you discovered service configurations to manage, you must import them. Importing service configurations for a device You must add a device to the BIG-IP Device inventory list, and discover associated services, before you can import services to BIG-IQ for the device. To manage a device's service configuration from BIG-IQ, you must import the service configuration from the managed device to BIG-IQ. Important: You, or any other BIG-IQ system user, cannot perform any tasks on the BIG-IQ system while it is importing a service configuration. Large configurations can take a while to import, so let other BIG- IQ users know before you start this task. 1. At the top of the screen, click Devices. 2. Click the name of the device you want to import a service configuration from. 3. On the left, click Services. 4. For the device's configuration you are importing, select the Create a snapshot of the current configuration before importing. check box to save a copy of the device's current configuration. You're not required to create a snapshot, but it is a good idea in case you have to revert to the previous configuration for any reason. 5. Click the Import button next to the service you want to import to the BIG-IQ system. 8

F5 BIG-IQ Centralized Management: ADC If the current configuration on the BIG-IQ is different than the one on the BIG-IP device, BIG-IQ displays a screen for you to resolve the conflicts. 6. If there are conflicts, select one of the following options for each object that is different, and then click the Continue button: Use BIG-IQ to use the configuration settings stored on BIG-IQ. Use BIG-IP to override the configuration setting stored on BIG-IQ with the settings from the BIG-IP device. You can now manage the configuration of this service for this device from BIG-IQ. Managing a device from the device properties screen You can use a device's Properties screen to manage that device. You can log directly in to the device, remotely reboot it, and create an instant backup of its configuration. You can also view details about the managed device, such as: Host name Self IP Address Build Number Software Version Status Last Contact Boot Location Cluster Properties From this screen you can also perform the following tasks: Create an instant backup of the device's configuration. Change the boot location of the device. Edit cluster properties. Log directly into the device from BIG-IQ. Reboot the device from BIG-IQ. Access details about the health of the device. Access statistics for the device (if applicable). Access services licensed for the device. 1. At the top of the screen, click Devices. 2. Click the name of the device you want to view. The device Properties screen opens. Filtering the BIG-IP device inventory list for specific BIG-IP components From each BIG-IQ screen that contains a list of objects, you can easily find specific objects. For example, after you discover several devices, you might want to find a specific device by its name or IP address. To do this, you start by filtering on certain configuration objects. Filtering on specific criteria saves you time because you can view only those objects associated with the criteria you specify. 1. At the top of the screen, click Devices. 2. To search for a specific object, in the Filter field at the top right of the screen, type all or part of an object's name and click the filter icon. BIG-IQ refreshes the screen to show only those devices that contain the object you filtered on. 3. To remove the filter, click the X icon next to it. 9

Managing Device Resources How do I change object settings on a managed device? To change the object settings on a managed device, there are four tasks to perform. This figure illustrates the workflow you perform to manage the objects on BIG-IP devices. Changing the settings is the second step in this process. Figure 1: Change managed object workflow Changing device local traffic objects Making revisions to the configuration of local traffic objects simplifies managing your devices. Important: If you revise configurations on devices that belong to a high availability cluster, the BIG-IQ synchronizes cluster members automatically when you deploy the change. Do not try to make the same changes to multiple devices. If you try to replicate changes you made on one device in the cluster, the next config sync attempt could fail. 1. At the top of the screen, click Configuration. 2. On the left, expand LOCAL TRAFFIC. 3. Under LOCAL TRAFFIC, select the object type that you want to modify. The screen displays a list of objects (of the type you selected) that are defined on this BIG-IQ. 4. Click the name of the object that you want to change. If you select Virtual Servers, there are a couple of unique operations that you can perform at this point. You can either clone a virtual server to create a new one based on the selected server (see Cloning a virtual server), or you can attach irules to several virtual servers at once (see Attaching irules to virtual servers). The Properties screen for the selected object opens. 5. Make changes to the properties you want to modify. 6. When you are satisfied with the changes you have made, click Save. The revisions you saved are made, and the Properties screen for the selected object closes. Changes that you make are made only to the pending version. The pending version serves as a repository for changes you stage before deploying them to the managed device. Object settings for the pending version are not the same as the object settings on the actual BIG-IP device until they are deployed or discarded. Important: There is an exception to this pattern. When you view properties for a pool member and click Enable, Disable, or Force Offline, you can choose whether you want the change to occur immediately (Change Now) or not at all (Cancel). The same exception is true when you enable or disable a virtual server. To apply the working configuration settings to the BIG-IP device, you now need to deploy the revisions. Creating a new virtual server In BIG-IQ Centralized Management, you can use the Local Traffic interface to add a virtual server to a managed device. 10

F5 BIG-IQ Centralized Management: ADC Important: When you are revising configurations on devices that belong to a high availability cluster, it is important to let the changes synchronize to the cluster members instead of trying to make the same changes to multiple devices. If you try to replicate changes you made on one device in the cluster, the next config sync attempt could fail. 1. At the top of the screen, click Configuration. 2. On the left, expand LOCAL TRAFFIC. 3. Under LOCAL TRAFFIC, select Virtual Servers. The screen lists the virtual servers defined on this device. 4. Click Create. The New Virtual Server screen opens. 5. In the Name field, type in a name for the virtual server you are creating. 6. From the Device list, select the device on which to create the virtual server. 7. For Partition, type the name of the BIG-IP device partition on which you want to create the virtual server. 8. In the Description field, type in a brief description for the virtual server you are creating. 9. If you want the virtual server and its resources to be available for load balancing, for State (on BIG- IQ), select Enabled. 10. For the Source Address, type an IP address or network from which the virtual server will accept traffic. For this setting to work, you must specify a value other than 0.0.0.0/0 or ::/0 (that is, any/0, any6/0). In order to maximize the utility of this setting, specify the most specific address prefixes that include your customer addresses, but exclude addresses outside of their range. 11. For the Destination Address, type the IP address of the destination you want to add to the Destination list. 12. In the Service Port field, type a service port number, or select a type from the list. When you select a type from the list, the value in the Service Port field changes to reflect the associated default, which you can change. 13. To configure the virtual server so that its status contributes to the associated virtual address status, select the check box for Notify Status to Virtual Address. When this setting is disabled, the status of the virtual server does not contribute to the associated virtual address status. When you enable route advertisement of virtual addresses, this status impacts the behavior of the system. 14. To specify configuration parameters for this virtual server, expand Configuration and continue with the next sixteen steps. Otherwise, skip to step 32 in this procedure. 15. For the Type, select the type of network service provided by this virtual server. The default is Standard. Note: For details on the significance of choosing one option over another, refer to the BIG-IP documentation on virtual servers available on support.f5.com. 16. For the Protocol, select the network protocol name you want the system to use to direct traffic on this virtual server. The default is TCP. The Protocol setting is not available when you select Performance (HTTP) as the type. Note: For details on the significance of choosing one option over another, refer to the BIG-IP documentation on virtual servers available on support.f5.com. 17. For the VLANs and Tunnel Traffic setting, select the VLANs and tunnels for which the virtual server is enabled or disabled. The default is All VLANs and Tunnels. If you select another option, the system presents additional settings. 11

Managing Device Resources Note: For details on the significance of choosing one option over another, refer to the BIG-IP documentation on virtual servers available on support.f5.com. 18. From the Source Address Translation list, select the type of address translation pool used for implementing selective and intelligent source address translation. Note: For details on the significance of choosing one option over another, refer to the BIG-IP documentation on virtual servers available on support.f5.com. 19. In the Connection Limit field, type the maximum number of concurrent connections allowed for the virtual server. 20. In the Connection Rate Limit field, type the maximum number of connections-per-second allowed for a pool member. When the number of connections-per-second reaches the limit for a given pool member, the system redirects additional connection requests. This helps detect Denial of Service attacks, where connection requests flood a pool member. Setting the limit to 0 turns off connection limits. 21. From the Connection Rate Limit Mode list, select the scope of the rate limit defined for the virtual server. Note: For details on the significance of choosing one option over another, refer to the BIG-IP documentation on virtual servers available on support.f5.com. 22. If you want the system to translate the virtual server address, select Address Translation. This option is useful when the system is load balancing devices that have the same IP address. 23. If you want the system to translate the virtual server port, select Port Translation. This option is useful when you want the virtual server to load balance connections to any service. The default is enabled. 24. From the Source Port list, select how you want the system to preserve the connection's source port. Note: For details on the significance of choosing one option over another, refer to the BIG-IP documentation on virtual servers available on support.f5.com. 25. To replicate client-side traffic (that is, prior to address translation) to a member of a specified pool, select that pool from the Clone Pool (Client) list. 26. To replicate server-side traffic (that is, prior to address translation) to a member of a specified pool, select that pool from the Clone Pool (Server) list, select the device on which to create the virtual server. 27. Use the Auto Last Hop list to specify whether you want the system to send return traffic to the MAC address that transmitted the request, even if the routing table points to a different network or interface. 28. From the Last Hop Pool list, select the pool the system uses to direct reply traffic to the last hop router. 29. If you want the system to allow IPv6 hosts to communicate with IPv4 servers, select NAT64. 30. To specify the virtual server score in percent, type that value in the VS Score field. Global Traffic Manager (GTM ) uses this value to load balance traffic in a proportional manner. 31. To specify additional resource details for this virtual server, expand Resources and continue with the next two steps. Otherwise, skip to the last step in this procedure. 32. To specify which irules are enabled for this virtual server, use the arrow buttons to move irules between the Available and Enabled lists. irules are applied in the order in which they are listed. 33. Use the Default Pool list to select the pool name that you want the virtual server to use as the default pool. 12

F5 BIG-IQ Centralized Management: ADC A load balancing virtual server sends traffic to this pool automatically, unless an irule directs the server to send the traffic to another pool. 34. For the Default Persistence Profile, select the name of the default profile you want the virtual server to use to maintain session persistence. 35. For the Fallback Persistence Profile, select the name of the fallback profile you want the virtual server to use to maintain session persistence. Note: You can select Default Persistence Profile alone, or you can select both. That is, if you use Fallback Persistence Profile, you must also select a Default Persistence Profile. For additional detail on how fallback persistence profiles work, refer to SOL30483109: Overview of Fallback Persistence on AskF5.com 36. Click Save & Close. The system creates the new virtual server with the settings you specified. Cloning a virtual server You can use the BIG-IQ Local Traffic interface to create a new virtual server based on the specifications for an existing one. This can be a great time saver when you need to create several virtual servers that use a number of similar settings. 1. At the top of the screen, click Configuration. 2. On the left, expand LOCAL TRAFFIC. 3. Under LOCAL TRAFFIC, select Virtual Servers. The screen displays the list of virtual servers defined on this device. 4. Select the check box associated with the existing virtual server that you want to clone. 5. Click the Clone button. The BIG-IQ creates a new virtual server using the settings of the one you selected. 6. Modify the parameters for the new virtual server as needed. Important: Two virtual servers cannot share the same Destination Address, Protocol, and VLAN. 7. When you are satisfied with the settings for the new virtual server, click Clone. The system creates the new virtual server with the settings you specified. How do I manage LTM profiles in BIG-IQ? You can create or modify custom LTM profiles in BIG-IQ Centralized Management and then deploy the profiles to your managed devices. The current release supports a number of profile types. When you create a profile, you specify a parent profile from which the custom profile inherits its properties. You then specify which of these properties you want to override. You can name any existing profile as a parent profile. When you modify a profile that has child profiles (that is, profiles that name your profile as a parent profile), all of the child profiles inherit any changes you made in the parent profile (except those you choose to override). Create an LTM profile You must discover a device and import that device's service configurations before you can add a profile to that device from BIG-IQ Centralized Management. Creating a new profile allows you to specify the parameters that define the characteristics you want your virtual servers to use. Each virtual server that references this profile uses the parameters you specify for this profile. Additionally, the parameters you define for this profile are given to the profiles that name this profile as their parent profile. 1. At the top of the screen, click Configuration. 2. On the left, expand LOCAL TRAFFIC. 13

Managing Device Resources 3. Under LOCAL TRAFFIC, select Profiles. The screen displays the list of profiles defined on this device. 4. Click Create. The Profiles - New Item screen opens. 5. In the Name field, type in a name for the LTM profile you are creating. 6. For Partition, type the name of the BIG-IP device partition on which you want to create the profile. 7. For the Type, select the type of profile you want to create. The Parent Profile field displays. 8. From Parent Profile, select the parent profile from which you want your profile to inherit settings. Note: The parent profile you select determines the value of the profile parameters for this profile. You can override these values, but if you do not, changes made to parameters in the parent profile propagate to all child profiles. A number of additional fields display, specifying the parameters associated with the parent profile you selected. There are two controls for each field. The first one (a check box) controls whether you want to override the inherited value for that field. The second control (the type varies by field) sets the value you want for the parameter. 9. For any fields you want to override, select the check box and then specify the value you want for the fields you selected. Note: You can select Override All if you want to override all of the parent profile parameter values. Important: If you override a parent profile parameter, regardless of whether or not you change the parameter's value, then future changes to the parent's parameter value will not be inherited by this profile. 10. If you are adding a profile that requires a security parameter, specify the passphrase in the corresponding Passphrase field. Note: For version 12.0.0 devices, you do not need to supply the pass phase for the profile. For devices prior to version 12.0.0, if you plan to make changes to a Client SSL profile, you need to supply the pass phrase for that profile. If you do not change any of the parameters for the profile or associate the profile with a virtual server or another client SSL profile, then you can leave this field blank. So, if you add a pre-version 12.0.0 device that has a significant number of profile definitions, you do not need to add the pass phrase for every profile, just the ones that you plan to change or associate with an LTM object. 11. Click Save & Close. The system creates the new profile you specified and adds it to the list of profiles. For detailed information on the impact of using a particular profile parameter value, refer to the BIG- IP documentation on AskF5.com. You can now use the profile you created. You can select it when you configure a virtual server. You can also use it as a parent profile to base new BIG-IP LTM profiles on. You must deploy your changes to the BIG-IP device before you can see these changes on the device. Edit an LTM profile By editing a profile, you can revise the parameters that define the characteristics you want your virtual servers to use. Each virtual server that references this profile uses the parameters you specify for this profile. Additionally, the parameters you define for this profile are given to the profiles that name this profile as their parent profile. 1. At the top of the screen, click Configuration. 14

F5 BIG-IQ Centralized Management: ADC 2. On the left, expand LOCAL TRAFFIC. 3. Under LOCAL TRAFFIC, select Profiles. The screen displays the list of profiles defined on this device. 4. Click the name of the profile you want to edit. The screen displays the current settings for the selected profile. 5. In the Description field, you can revise the brief description for the selected profile. 6. Under Referenced by, note the virtual servers and profiles that refer to this profile. Changes you make to this profile impact all of the virtual servers listed here. Profiles that are listed here name this profile as their parent profile, so they inherit any changes you make to this profile. 7. Under Override All, select the corresponding check box for any fields you want to override, and then specify the value you want for the fields you selected. Note: You can select All if you want to override all of the parent profile parameter values. 8. If you imported a profile that requires a security parameter, specify the passphrase in the corresponding Passphrase field. Important: For imported profiles that use passphrases: If the profile was imported from a version 12.0.0 or later device, you do not need to re-enter the passphrase. If the profile was imported from a device prior to version 12.0.0 and you plan to make changes to the profile (or if you associate the profile with a virtual server or a child profile), then you must supply the passphrase for the imported profile. If you do not change any of the parameters for the profile or associate the profile with a virtual server or a child profile, then you do not need to re-enter the passphrase. 9. When your edits are complete, click Save. The system updates the profile with the settings you specified and adds it to the list of profiles. For detailed information the impact of using a particular profile parameter value, refer to the BIG-IP documentation on support.f5.com. You must deploy your changes to the BIG-IP device before you can see these changes on the device. Attaching irules to virtual servers You can use the BIG-IQ Local Traffic interface to attach irules to a set of virtual servers. Adding an irule sequence to a group of servers at once can save time and help you cut down on errors that result from performing repetitious tasks. 1. At the top of the screen, click Configuration. 2. On the left, expand LOCAL TRAFFIC. 3. Under LOCAL TRAFFIC, select Virtual Servers. The screen displays the list of virtual servers defined on this device. 4. Select the check boxes associated with the virtual servers to which you want to attach irules. 5. From the Actions button, select Attach irules. The Virtual Servers - Attach irules screen opens. 6. To specify which irules to attach to the selected virtual servers, select them in the Available irules list, and click the right arrow to add them to the irules to be Attached list. 7. Specify the order in which you want the irules to attach using the up and down arrows. 8. Specify the list position to attach these irules. 15

Managing Device Resources To add the rules to the beginning of the existing list, click Attach to top of each virtual server's irules list. To add the rules to the end of the existing list, click Attach to bottom of each virtual server's irules list. 9. Specify whether to keep the irule list order for irules that are already attached to the virtual servers. To keep the existing list order, click Keep virtual servers' existing rules list order. To change the existing list order to what you specified in step 2, click Reorder virtual servers' existing rules to preserve selected rules order. 10. Click Save and then confirm your choice by clicking Modify. A Modify Items dialog box pops up to show the status of your request. 11. Click Close to dismiss the dialog box and complete the process. Creating a new irule You can use the BIG-IQ Local Traffic interface to add a new irule to a managed device. Important: When revising configurations on devices that belong to a high availability cluster, it is important to let the changes synchronize to the cluster members instead of trying to make the same changes to multiple devices. If you try to replicate changes you made on one device in the cluster, the next config sync attempt could fail. Important: Rules are different from most other Local Traffic objects in that they associate with virtual servers instead of devices. So to deploy a new irule to a device, you attach the irule to a virtual server associated with the target device and then deploy that change. 1. At the top of the screen, click Configuration. 2. On the left, expand LOCAL TRAFFIC. 3. Under LOCAL TRAFFIC, select irules. The screen displays a list of irules that are known on this device. 4. Click Create. The New irule screen opens. 5. For Name, type a name for the irule you are creating. 6. For Partition, type the name of the BIG-IP device partition on which you want to create the irule. 7. For the Body, compose the script sequence that defines the irule. For guidance on creating an irule, consult the AskF5 (support.f5.com) Knowledge Base. You can search the AskF5 website for irules documentation that provides an overview of irules, lists the basic elements that make up an irule, and shows some examples of how to use irules. 8. Click Save & Close. The system creates the new irule with the settings you specified. To deploy this irule to a device, attach the irule to a virtual server associated with the target device and then deploy that change. Create a new pool You can use the BIG-IQ Local Traffic interface to add a pool to a managed device. Important: When revising configurations on devices that belong to a high availability cluster, it is important to let the changes synchronize to the cluster members instead of trying to make the same changes to multiple devices. If you try to replicate changes you made on one device in the cluster, the next config sync attempt could fail. 1. At the top of the screen, click Configuration. 16

F5 BIG-IQ Centralized Management: ADC 2. On the left, expand LOCAL TRAFFIC. 3. Under LOCAL TRAFFIC, select Pools. The screen displays a list of pools that are defined on this device. 4. Click Create. The New Pool screen opens. 5. In the Name field, type in a name for the pool you are creating. 6. From the Device list, select the device on which to create the pool. 7. For Partition, type the name of the BIG-IP device partition on which you want to create the pool. 8. In the Description field, type in a brief description for the pool you are creating. 9. To enable specific health monitors for this pool, select a monitor from the Health Monitors list. To add additional monitors click the + icon and repeat this step. 10. If you enabled specific monitors for this pool, for the Availability Requirement field, specify the minimum number of monitors that must report a pool as being available before the member is defined as being in an up state. If all of the monitors must report the pool available, select All. To specify a minimum number, select At Least, and then type the minimum number in the Health Monitors field. 11. In the Load Balancing Method field, specify the type of load balancing you want the pool to use. The default is Round Robin. 12. In the Priority Group Activation setting, specify how the system load balances traffic. The default is Disabled. a) To have the system load balance traffic according to the priority number assigned to the pool member, select Less than. b) If you use a priority number, from the Available Member(s) list, select the minimum number of members that must be available in one priority group before the system directs traffic to members in a lower priority group. When a sufficient number of members becomes available in the higher priority group, the system again directs traffic to the higher priority group. 13. To specify advanced properties, expand the Advanced Properties area and continue with the next twelve steps. Otherwise, click Save & Close now. 14. To automatically enable or disable NATs for connections that use this pool, for the NAT setting, select Allow. 15. To automatically enable or disable SNATs for connections that use this pool, for the SNAT setting, select Allow. 16. To specify how the system should respond when the target pool member becomes unavailable, select a value from the Action On Service Down list. Option Description None Reset Drop Specifies that the system takes no action to manage existing connections when a pool member becomes unavailable. The system maintains existing connections, but does not send new traffic to the member. Specifies that, if there are no pool members available, the system resets and clears the active connections from the connection table and sends a reset (RST) or Internet Control Message Protocol (ICMP) message. If there are pool members available, the system resets and clears the active connections, but sends newly arriving connections to the available pool member and does not send RST or ICMP messages. Specifies that the system simply cleans up the connection. Reselect Specifies that the system manages established client connections by moving them to an alternative pool member when monitors mark the original pool member down. 17

Managing Device Resources 17. To specify the duration during which the system sends less traffic to a newly-enabled pool member, select a value from the Slow Ramp Time field. The amount of traffic is based on the ratio of how long the pool member has been available compared to the slow ramp time, in seconds. Once the pool member has been online for a time greater than the slow ramp time, the pool member receives a full proportion of the incoming traffic. Slow ramp time is particularly useful for the least connections load balancing mode. Important: Setting this to a non-zero value can cause unexpected Priority Group behavior, such as load balancing to a low-priority member even with enough high-priority servers. 18. To specify whether the system sets a Type of Service (ToS) level within a packet sent to the client, based on the targeted pool, select a value from the IP ToS to Client list. Setting a ToS level affects the packet delivery reliability. Option Description Pass Through The system does not change the ToS level within a packet. Specify Mimic Provides a field in which you can specify a ToS level to apply. Valid values are from 0 to 255. Specifies that the system sets the ToS level of outgoing packets to the same ToS level of the most-recently received incoming packet. For example, if the mostrecently received packet had a ToS level of 3, the system sets the ToS level of the next outgoing packet to 3. 19. To specify whether the system sets a Type of Service (ToS) level within a packet sent to the server, based on the targeted pool, select a value from the IP ToS to Server list. Setting a ToS level affects the packet delivery reliability. Option Description Pass Through The system does not change the ToS level within a packet. Specify Provides a field in which you can specify a ToS level to apply. Valid values are from 0 to 255. Mimic Specifies that the system sets the ToS level of outgoing packets to the same ToS level of the most-recently received incoming packet. For example, if the mostrecently received packet had a ToS level of 3, the system sets the ToS level of the next outgoing packet to 3. 20. To specify whether the system sets a Quality of Service (QoS) level within a packet sent to the client, based on the targeted pool, select a value from the Link QoS to Client list. Setting a QoS level determines the packet delivery priority. Option Description Pass Through The system does not change the QoS level within a packet. Specify Provides a field in which you can specify a QoS level to apply. Valid values are from 0 to 7. 21. To specify whether the system sets a Quality of Service (QoS) level within a packet sent to the server, based on the targeted pool, select a value from the Link QoS to Server list. Setting a QoS level affects the packet delivery priority. Option Description Pass Through The system does not change the QoS level within a packet. 18

F5 BIG-IQ Centralized Management: ADC Option Specify Description Provides a field in which you can specify a QoS level to apply. Valid values are from 0 to 7. 22. To specify the number of times the system tries to contact a new pool member after a passive failure, select a value from the Reselect Tries field. A passive failure consists of a server-connect failure, or a failure to receive a data response within a user-specified interval. The default is 0, which indicates no reselects. 23. To enable TCP request queueing, select Request Queueing. 24. To specify the maximum number of connection requests allowed in the queue, type an entry in the Request Queue Depth field. The default value of 0 permits unlimited connection requests, constrained only by available memory. 25. To specify the maximum number of milliseconds that a connection request can be queued until capacity becomes available, whereupon the connection request is removed from the queue and reset, type an entry in the Request Queue Timeout field. The default value of 0 permits unlimited time in the queue. 26. Click Save & Close. The system creates the new pool with the settings you specified. Create a new pool member You can use the BIG-IQ Local Traffic interface to add a pool member to a pool. 1. At the top of the screen, click Configuration. 2. On the left, expand LOCAL TRAFFIC. 3. Under LOCAL TRAFFIC, select Pools. The screen displays a list of pools that are defined on this device. 4. Click the name of the pool to which you are going to add a new member. The properties screen for that pool opens. 5. Near the bottom of the screen, click the New Member button. The New Pool screen opens. 6. Specify the Node Type: If you want the new member to be an existing BIG-IP node, select Existing Node and then select the Node. If you want the new member to be identified by an IP address, select Address and then type the Node Name and Node Address for the node. 7. For the Port, type the service port for the pool member. 8. In the Description field, type in a brief description for the pool member you are creating. 9. Specify the Health Monitors for this pool member. To use the settings from the pool, select Inherit from Pool To select specific health monitors for this pool member: 1. Select Member Specific. 2. Select a monitor from the Health Monitors list. 3. To add additional monitors click the + icon and repeat this step 4. If you activate more than one health monitor, specify the Availability Requirement. Either select All, or select At Least, and then type a number. Note: This setting specifies the number of health monitors that must receive successful responses for the pool member to be considered available. 19

Managing Device Resources 10. For the Ratio, type the ratio weight you want to assign to the new pool member. When you use the ratio load balancing method, you can assign a ratio weight to each pool member in a pool. Local Traffic uses this ratio weight to determine the correct pool member for load balancing. Note that at least one pool member in the pool must have a ratio value greater than 1. Otherwise, the effect equals that of the Round Robin load balancing method. 11. If priority groups are enabled for this pool, type a Priority Group number for this member. Priority groups must be activated on the pool, if the number of available members for the highest priority group drops below your setting, the traffic is routed to the next highest member. If priority groups are disabled on the pool, this setting is not used. 12. For the Connection Limit, type the maximum number of concurrent connections allowed for this pool member. 13. For the Connection Rate Limit, type the maximum rate of new connections per second allowed for this pool member. When you specify this limit, the system controls the number of allowed new connections per second, thus providing a manageable increase in connections without compromising availability. The default value of 0 specifies that there is no limit on the number of connections allowed per second. 14. Click Save & Close. The system creates the new pool member with the settings you specified. Delegate enable and disable permissions To perform this task, you must log in as an Administrator. You can assign permission to enable or disable virtual servers or pool members to other users. This allows those users to enable or disable specific virtual servers or pool members immediately, without having to deploy those changes. 1. At the top of the screen, click System. 2. On the left, click USER MANAGEMENT > Users. 3. Click the Add button. 4. From the Auth Provider list, select local (Local) to have BIG-IQ authenticate this user. 5. In the User Name field, type the user name for this new user. 6. In the Full Name field, type a name to identify this user. The full name can contain a combination of symbols, letters, numbers and spaces. 7. In the Password and Confirm Password fields, type the password for this new locally-authenticated user. You can change the password any time. 8. Click Save. The system creates a new user. 9. On the left, click USER MANAGEMENT > Roles. 10. Click the Add button. 11. In the Name field, type a name to identify this role. 12. From the Role Type list, select the kind of role you want to add. To create a role to which you can delegate virtual server permissions to immediately disable or enable virtual servers to which this role is assigned, select Virtual Server Operator. To create a role to which you can delegate pool member permissions to immediately disable, enable or force offline pool members of pools to which this role is assigned, select Pool Member Operator. Permissions for specific virtual servers or pool members are not assigned to this role yet. You need to assign permissions for each object individually. 20

F5 BIG-IQ Centralized Management: ADC 13. From the Active Users and Groups list, select the name of the user you specified in step7. 14. Click Save. The new role is created. 15. To delegate permissions for a virtual server, complete these sub-steps. a) At the top of the screen, click Configuration. b) On the left, expand LOCAL TRAFFIC. c) Under LOCAL TRAFFIC, select Virtual Servers. d) Click the name of the virtual server for which you wish to delegate permissions. The properties tab for the selected virtual server opens. e) Click Permissions. f) In the Role field, type the name of the role you specified in step 13. g) Click Save. The virtual server can now be enabled or disabled by a user logged in with the name you specified in step 7. 16. To delegate permissions for all of the pool members in a pool, do these sub-steps. a) Under LOCAL TRAFFIC, select Virtual Servers. b) On the left, expand LOCAL TRAFFIC. c) Under LOCAL TRAFFIC, select Pools. d) Click the name of the pool to which the pool member belongs. The properties tab for the selected pool opens. e) Click Permissions. f) In the Role field, type the name of the role you created in steps 13. g) Click Save & Close. Pool members in this pool can now be enabled, disabled, or forced offline by a user logged in with the name you specified in step 7. Create a new node You can use the BIG-IQ Local Traffic interface to add a node to a managed device. Nodes are the basis for creating a load balancing pool. For any server that you want to be part of a load balancing pool, you must first create a node, that is, designate that server as a node. After designating the server as node, you can add the node to a pool as a pool member. You can also associate a health monitor with the node, to report the status of that server. Important: When revising configurations on devices that belong to a high availability cluster, it is important to let the changes synchronize to the cluster members instead of trying to make the same changes to multiple devices. If you try to replicate changes you made on one device in the cluster, the next config sync attempt could fail. 1. At the top of the screen, click Configuration. 2. On the left, expand LOCAL TRAFFIC. 3. Under LOCAL TRAFFIC, select Nodes. The screen displays a list of nodes that are defined on this device. 4. Click Create. The New Node screen opens. 5. In the Name field, type in a name for the node you are creating. 6. From the Device list, select the device on which to create the node. 7. For the Address field, type in the IP address that identifies the new node. 8. For Partition, type the name of the BIG-IP device partition on which you want to create the node. 9. In the Description field, type in a brief description for the node you are creating. 21